咨询与建议

限定检索结果

文献类型

  • 1,498 篇 会议
  • 1,223 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,728 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,919 篇 工学
    • 1,473 篇 计算机科学与技术...
    • 1,178 篇 软件工程
    • 321 篇 信息与通信工程
    • 281 篇 控制科学与工程
    • 156 篇 生物工程
    • 144 篇 电气工程
    • 137 篇 机械工程
    • 129 篇 电子科学与技术(可...
    • 95 篇 光学工程
    • 92 篇 生物医学工程(可授...
    • 71 篇 仪器科学与技术
    • 67 篇 动力工程及工程热...
    • 61 篇 化学工程与技术
    • 43 篇 建筑学
    • 42 篇 网络空间安全
    • 41 篇 安全科学与工程
    • 39 篇 交通运输工程
  • 893 篇 理学
    • 545 篇 数学
    • 189 篇 物理学
    • 173 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 73 篇 化学
  • 546 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 78 篇 医学
    • 68 篇 临床医学
    • 58 篇 基础医学(可授医学...
    • 41 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 60 篇 semantics
  • 56 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 43 篇 software
  • 41 篇 optimization
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 37 篇 data mining
  • 33 篇 deep learning
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 33 篇 cloud computing
  • 33 篇 web services
  • 32 篇 protocols

机构

  • 493 篇 state key labora...
  • 190 篇 department of co...
  • 154 篇 department of co...
  • 116 篇 national key lab...
  • 107 篇 state key labora...
  • 86 篇 state key labora...
  • 66 篇 department of co...
  • 62 篇 shanghai key lab...
  • 60 篇 school of softwa...
  • 59 篇 state key labora...
  • 52 篇 university of ch...
  • 51 篇 state key labora...
  • 46 篇 national key lab...
  • 38 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 31 篇 college of compu...
  • 31 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,361 篇 英文
  • 300 篇 其他
  • 67 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2728 条 记 录,以下是1821-1830 订阅
排序:
Extracting Secret key from Wireless Link Dynamics in Vehicular Environments
Extracting Secret Key from Wireless Link Dynamics in Vehicul...
收藏 引用
IEEE INFOCOM
作者: Xiaojun Zhu Fengyuan Xu Edmund Novak Chiu C. Tan Qun Li Guihai Chen State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210024 China Department of Computer Science the College of William and Mary Williamsburg VA 23185 USA Department of Computer and Information Sciences Temple University Philadelphia PA 19122 USA
A crucial component of vehicular network security is to establish a secure wireless channel between any two vehicles. In this paper, we propose a scheme to allow two cars to extract a secret key from RSSI (Received Si... 详细信息
来源: 评论
A QoS-aware composition method supporting cross-platform service invocation in cloud environment
A QoS-aware composition method supporting cross-platform ser...
收藏 引用
作者: Qi, Lianyong Dou, Wanchun Zhang, Xuyun Chen, Jinjun State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Nanjing University Nanjing 210093 China School of Systems Management and Leadership University of Technology Sydney Australia
With the increasing popularity of cloud computing technologies, more and more service composition processes are enacted and executed in could environment. Compared with the various and approximately infinite applicati... 详细信息
来源: 评论
Efficient median estimation for RFID systems
Efficient median estimation for RFID systems
收藏 引用
2012 International Conference on Computing, Measurement, Control and Sensor Network, CMCSN 2012
作者: Mustafa, Huda El Hag Zhu, Xiaojun Li, Qun Department of Computer Science College of William and Mary Williamsburg VA United States Department of Computer Science Faculty of Mathematical Sciences University of Khartoum Sudan State Key Laboratory for Novel Software Technology Nanjing University China
Radio frequency identification (RFID) tags are used in a lot of applications such as production line and inventory management. Sensors are also a widely adopted wireless technology. This large scale deployment of both... 详细信息
来源: 评论
Topic Correlation Analysis for Cross-Domain Text Classification  26
Topic Correlation Analysis for Cross-Domain Text Classificat...
收藏 引用
26th AAAI Conference on Artificial Intelligence, AAAI 2012
作者: Li, Lianghao Jin, Xiaoming Long, Mingsheng Key Laboratory for Information System Security Ministry of Education Tsinghua National Laboratory for Information Science and Technology School of Software Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Cross-domain text classification aims to automatically train a precise text classifier for a target domain by using labeled text data from a related source domain. To this end, the distribution gap between different d... 详细信息
来源: 评论
Topic correlation analysis for cross-domain text classification
Topic correlation analysis for cross-domain text classificat...
收藏 引用
26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference, AAAI-12 / IAAI-12
作者: Li, Anghao Jin, Xiaoming Long, Mingsheng Key Laboratory for Information System Security School of Software Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Cross-domain text classification aims to automatically train a precise text classifier for a target domain by using labeled text data from a related source domain. To this end, the distribution gap between different d... 详细信息
来源: 评论
Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
收藏 引用
电子学报(英文版) 2012年 第2期21卷 254-259页
作者: CHENG Hongbing RONG Chunming TAN Zhenghua ZENG Qingkai State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Information Engineering Jiangsu City Vocation College Nanjing 210036 China Department of Electronic Engineering and Computer Science University of Stavanger 4036 Stavanger Norway Department of Electronic Systems Aalborg University Niels Jernes Vej 12 9220 Aalborg Denmark
Cloud computing will be a main informa- tion infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for c... 详细信息
来源: 评论
Verification of workflow nets with transition conditions
收藏 引用
Journal of Zhejiang University-science C(computers and Electronics) 2012年 第7期13卷 483-509页
作者: Zhao-xia WANG Jian-min WANG Xiao-chen ZHU Li-jie WEN School of Software Tsinghua UniversityBeijing 100084China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China MOE Key Laboratory for Information System Security Tsinghua UniversityBeijing 100084China National Laboratory for Information Science and Technology Tsinghua UniversityBeijing 100084China SDepartment of Logistical Information&Engineering Logistical Engineering UniversityChongqing 400016China
Workflow management is concerned with automated support for business *** management systems are driven by process models specifying the tasks that need to be executed,the order in which they can be executed,which reso... 详细信息
来源: 评论
A cloud-based watermarking method for health data security
A cloud-based watermarking method for health data security
收藏 引用
2012 10th Annual International Conference on High Performance Computing and Simulation, HPCS 2012
作者: Yu, Zhiwei Thomborson, Clark Wang, Chaokun Wang, Jianmin Li, Rui Department of Computer Science and Technology Tsinghua University Beijing China Department of Computer Science University of Auckland New Zealand School of Software Tsinghua University Key Laboratory for Information System Security Beijing China
Private health information once confined to local medical institutions is migrating onto the Internet as an Electronic Health Record (EHR) that is accessed by cloud computing. No matter where it is hosted, health data... 详细信息
来源: 评论
A software watermark based architecture for cloud security
收藏 引用
14th Asia Pacific Web technology Conference, APWeb 2012
作者: Dai, Pengfei Wang, Chaokun Yu, Zhiwei Yue, Yongsheng Wang, Jianmin School of Software Tsinghua University Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security Ministry of Education China Department of Computer Science and Technology Tsinghua University China
Cloud Computing has emerged as a resource sharing platform, which allows different service providers to deliver software as services. However, for many security sensitive applications such as critical data processing ... 详细信息
来源: 评论
Optimizing energy consumption for time-constraint data query in wireless environment
Optimizing energy consumption for time-constraint data query...
收藏 引用
2012 IEEE International Conference on Cluster Computing Workshops, Cluster Workshops 2012
作者: Hu, Haiyang Hu, Hua Chiu, Dickson K.W. College of Computer Science Hangzhou Dianzi University Hangzhou Zhejiang 310018 China State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Engineering Chinese University of Hong Kong Hong Kong
To cope with time-constraint data query in an energy-efficient manner, mechanisms on joint optimization of expense and energy for mobile clients in wireless environments should be provided. We present an intelligent w... 详细信息
来源: 评论